Baowei Wang1,2,*, Weiwen Kong1, Wei Li1, Neal N. Xiong3
CMC-Computers, Materials & Continua, Vol.58, No.3, pp. 679-695, 2019, DOI:10.32604/cmc.2019.06106
Abstract Chaining watermark is an effective way to verify the integrity of streaming data in wireless network environment, especially in resource-constrained sensor networks, such as the perception layer of Internet of Things applications. However, in all existing single chaining watermark schemes, how to ensure the synchronization between the data sender and the receiver is still an unsolved problem. Once the synchronization points are attacked by the adversary, existing data integrity authentication schemes are difficult to work properly, and the false negative rate might be up to 50 percent. And the additional fixed group delimiters not only… More >